1Mon Oct 26 1998 - Fri Oct 30 1998
2
3vs SSH http://isakmp-test.ssh.fi/
4	$B$A$c$s$H%/%j%C%/$7$F@_Dj$9$l$PF0$/!#$9$2JXMx!#(B
5
6	SSH -> KAME
7		phase 1: DES+MD5
8		phase 2: DES+MD5
9			$B:G8e$^$G$-$A$s$H$$$1$k!#(B
10
11		phase 1: 3DES+MD5 (final cipher key$B@8@.$G(BSEGV$B$7$F$$$?$,=$@5:Q$_(B)
12		phase 2: DES+MD5
13			quick mode3$BH/L\(B(SSH -> KAME)$B$,(BKAME$BB&$G$[$I$1$J$$!#(B
14			$B$I$&$d$i!"(Bisakmp-test.ssh.fi$B$KF~$C$F$k<BAu$,(B
15			$B$A$g$C$H8E$$$i$7$$!#:G?7$N<BAu$H$d$C$F$_$?$i(B
16			$B@.8y$7$?!#$@$+$i$^$"$$$$$+!#(B
17
18	KAME -> SSH
19		phase 1: DES+MD5
20		phase 1: 3DES+MD5 (final cipher key$B@8@.$G(BSEGV$B$7$F$$$?$,=$@5:Q$_(B)
21
22		phase 2$B$O(BPFS$B$7$J$$$H7y$o$l$k!#%/%j%C%/$N$7$+$?$,B-$j$J$$(B?
23
24vs NIST linux IPsec + plutoplus
25	NIST -> KAME
26		phase 2: ESP DES+hmac-MD5$B$G!"(BKEYMAT$B$N<hF@$N$7$+$?$,0-$+$C$?(B
27			-> $B=$@5:Q$_(B
28		phase 2: initiator$B$,!V(BPFS$B$7$J$/$F$$$$!W$H8@$C$F$k$N$K(B
29			KE payload$B$r$D$1$F$$$?(B -> $B=$@5:Q$_(B
30		$B$&$^$/$$$C$?!#(BESP DES+hmac-MD5
31	KAME -> NIST
32		NIST$B$O(Bproposal$B$rJ#?tEj$2$k$HF0$+$J$$!#=$@5Cf$i$7$$!#(B
33		PFS$B4X78$NLdBj$OBP(BRedCreek$B$G=$@5:Q$_!#(B
34		$B$&$^$/$$$C$?!#(BESP 3DES+hmac-SHA1
35
36vs Checkpoint
37	tunnel mode$B$N$_!"F;>lGK$j$G$-$:(B
38
39vs RedCreek
40	KAME$B$O80$N(Brenew$B$,$G$-$J$$!#(B
41	RedCreek$B$O(BIPsec+fragment$B$G(Bping$B$7$F$bJV;v$7$J$$!#@hJ}$O(Brouter$BLr$G!"(B
42	$B$I$&$b(Btunnel$B$N1|9T$-$N(Bfragment$B$O$A$c$s$H=hM}$9$k$,!"<+J,08$N(B
43	fragment$B$O=hM}$7$F$/$l$J$$$h$&$@!#(B
44	RedCreek$B$O(Bphase 1$B$N(BDH group$B$H!"(Bphase 2$B$N(BPFS DH group$B$,F1$8$H;W$C$F$k!#(B
45
46	RedCreek -> KAME
47		ok
48	KAME -> RedCreek
49		phase 2$B$G(BKAME -> RC$B$N(Bquick mode1$BH/L\$rEj$2$?$H$3$m$G$X$/$k!#(B
50		PFS$B$7$h$&$H8@$C$F$$$k$N$K(BKE payload$B$H$+(BDH group$B$r$D$1$F$$$J$$!#(B
51			-> $B$3$l$+$iD>$7(B
52
53		$B?eMK8a8e!"D>$7$?!#$A$c$s$HF0$$$?!#(B
54
55vs Secure Computing
56	KAME -> Secure Computing
57		$B$5$C$/$j(Bok$B!#(B
58		phase1 DES+MD5
59		phase2 ESP DES+hmac-md5
60
61	Secure Computing -> KAME
62		phase1 DES+SHA1
63		phase2 ESP DES+hmac-md5
64			ok
65		phase1 3DES+SHA1
66			$B%@%a!#B?J,(BSecure Computing$B$N(B3DES$B$,%P%0$C$F$k!#(B
67			(KAME vs SSH$B$N<+F01?E>$O(Bok)
68			$B$"$C$A$N(Bparity bit(2^0)$B$,2x$7$$(B?
69			$BMbF|(B($BLZMK(B)$B$d$j$J$*$7$?$i$G$-$?!#$J$s$@(B?
70
71	phase1$B$N(Bproposal$B$NJV$7J}$r%(%s%P%0$7$F$?$N$GD>$7$^$7$?!#(B
72
73vs FreeS/WAN
74	KAME -> S/WAN	OK
75		phase1 DES+MD5
76		phase2 ESP DES+none
77		Phase 1 $B$G$OBt;3(Bproposal$B$rEj$2$D$1$F$O%@%a!#(B-> ibm.conf $B$r=$@5!#(B
78		pluto $B$N(B life duration $B$N2r<a$,4V0c$C$F$$$?!#(B
79	S/WAN -> KAME	N/A
80		transport mode $B$G(B initiate $B$G$-$J$$!#(B
81		racoon $B$O(B tunnel mode $B$N80$rFM$C9~$a$J$$!#(B
82
83vs Netscreen
84	Netscreen -> KAME	OK
85		phase1 DES+SHA1
86		phase2 ESP DES+none
87	KAME -> Netscreen	NG
88		phase 2 $B$G(B netscreen $B$K(B mulformed payload $BJV$5$l$k!#(B
89			-> netscreen $BD4$YCf!#(B
90			   $B$J$s$H$J$/(B multi transform $B$KBP1~$7$F$$$J$$MM;R!#(B
91
92vs Data Fellows (F-Secure$B:n$C$F$$$k$H$3(B)
93	KAME -> Data Fellows	OK
94		phase1 DES+MD5
95		phase2 ESP DES+HMAC-MD5
96		proposal number $B$O(B 1,2,3,..$B$H8@$&$N$G(B ibm.conf $B$GF($2$k!#(B
97		$B$?$^$K(B ESP Authentication failed $B$,=P$k!#ITL@!#(B
98	Data Fellow -> KAME	OK
99		phase1 $B$N(B 3DES $B$r;H$C$?$i(B1$B2s$@$1<:GT$7$?!#:F8=$;$:!#(B
100			parity bit $BLdBj!)(B
101		phase2 $B$N(B HASH(2) $B$K<:GT$9$k!#(B
102			IDii,IDir$B$rIU$1$k=hM}$r$$$$2C8:$K$7$F$?!#(B-> $B=$@5(B
103
104vs Routerware
105	phase 1$B$N(BDH group$B$H!"(Bphase 2$B$N(BPFS DH group$B$,F1$8$H2>Dj$7$F$$$k$h$&$@!#(B
106
107	KAME -> Routerware
108		phase 1(DES+MD5)$B!":G=i$N0E9f2=$5$l$?%Q%1%C%H(B(3$B1}I|L\$N9T$-(B)$B$r(B
109		Routerware$B$,$[$I$1$J$$!#8~$3$&$O(Blog$B$,A4A3$G$J$$(B...
110		$B$K$$$A$c$s$OHS$K$$$/$H9T$C$F5"$C$F$7$^$C$?!#L@F|:F;n9g!#(B
111
112	$B7k6I$d$l$J$$$^$^5"$C$F$7$^$C$?!#$7$/$7$/!#(B
113
114vs Shiva
115	tunnel mode$B$N$_(B
116
117vs Intel (only IKE)
118	KAME -> Intel	OK
119		phase1 DES MD5
120		phase2 AH SHA1
121
122		Intel $B$G(B acceptable $B$J$N$K(B no supported payload $B$,=P$F$?!#(B
123		$B$=$N(B Informational Exchange $B$N(B decode $B$K(B racoon $B$,<:GT!#(B
124			-> Informational $B$N(B IV $B$O(B phase1 $B$+$iD>$G:n$k!#(B
125			-> Intel $B$O5/0x(Bexchange$B$N(B M-ID $B$HF1$8(BM-ID$B$r;H$C$F$$$k!#(B
126	Intel -> KAME	OK
127		phase1 DES MD5
128		phase2 AH SHA1
129
130vs Microsoft WinNT(Win2000 :-P)
131	DELETE payload$B$,Mh$?$1$I=hM}$K<:GT!#<BAu$O$9$3$7D>$7$?$,(B
132	$B%F%9%H$7$F$$$J$$!#(B
133
134	Microsoft -> KAME 
135		phase 1: DES+MD5
136		phase 2: ESP(DES+MD5)
137
138		phase 2$B$"$?$^$N(BID payload$B$N=hM}$KLdBj$,$"$C$?$N$GD>$7$?$i(B
139		$B$A$c$s$HF0$$$?!#(B
140
141	KAME -> Microsoft
142		phase 1: DES+MD5
143		phase 2: ESP(DES+MD5)
144
145		phase 2$B$N:G8e$,40N;$7$J$$!#M}M3$O!"(Bcommit bit$B$D$-$N%Q%1%C%H$r(B
146		$B<N$F$F$$$k$?$a!#(Bsupport$B$7$F$J$$$D$b$j$J$i!"(Bcommit bit$B$rL5;k$7$F(B
147		$B=hM}$9$Y$-!#(B
148
149vs IBM AIX
150	KAME -> IBM
151		phase 1 3DES+MD5
152		phase 2 AH(hmac-SHA1)
153
154		encryption mode attribute$B$r$D$1K:$l$?!#(Bconfig file$B$K(B
155		$B=q$$$?$iDL$C$?!#(B
156
157	IBM -> KAME
158		phase 1 3DES+MD5
159		phase 2 AH(hmac-SHA1)
160
161		$B$5$C$/$j(Bok
162
163vs KAME
164	phase 1: 3DES+MD5
165	phase 2: AH(hmac-SHA1) + ESP(DES+hmac-MD5)
166
167	NOTE: phase 2$B$K$D$$$F$O8DJL$K%M%4!#(B
168	ping -f$B!"(Btelnet chargen$B$H$b$P$C$A$7!#(B
169	$B$?$^!<$K(B
170	- ah checksum error
171	- $B=i4|2=IT==J,$J(BSA$B$,(B{esp,ah}_output$B$KEO$k(B("no replay field")
172	$B$,5/$-$k!#$J$<$@!#(B
173
174	2054652 inbound processes succeeded
175	0 inbound process's security policy violation
176	214 inbound SA is unavailable
177	0 inbound processing failed due to EINVAL
178	0 failed getting a SPI
179	0 inbound packets failed on AH replay check
180	0 inbound packets failed on ESP replay check
181	1027563 inbound AH packets considered authentic
182	3 inbound AH packets failed on authentication
183	1027036 inbound ESP packets considered authentic
184	0 inbound ESP packets failed on authentication
185	AH input histogram:
186		hmac SHA1: 1027566
187	ESP input histogram:
188		DES CBC: 1027089
189	1929501 succeeded outbound process
190	0 outbound process's security policy violation
191	13956 outbound SA is unavailable
192	17 outbound processes failed due to EINVAL
193	0 packets without route
194	AH output histogram:
195		hmac SHA1: 964909
196	ESP output histogram:
197		DES CBC: 964592
198
199manual keying
200=============
201vs NIST
202	RC5-cbc: $B$P$C$A$j(B
203
204vs SSH
205	CAST128-cbc: $B$@$a(B
206		SSLeay$B$N!V80D9$,C;$$$H$-$N(Bround$B?tLdBj(B?$B!W$N$?$a$+(B?
207		mail$B$GLd$$9g$o$;Cf(B(11/1)
208
209		KAME$B$N(Bsys/crypto$B$K%P%0$"$j!#=$@5:Q$_!#(B
210
211vs Ericsson ACC (mobile-ip$B$7$F$k$R$H$H$N4X78$OITL@(B)
212	(manual keying$B!"(BAH tunnel)
213	Ericcson$B<BAu$O(Bfragment$B$5$l$F$$$k%Q%1%C%H$,$/$k$H(Bcore dump$B$7$F$$$?$,!"(B
214	$B=$@5$5$l$?!#(B
215
216vs Freeswan
217	==+=======================+==209.154.161.0/24
218	  |184			  |149
219	freeswan router		kame router
220	  |?			  |2
221	==+==10.161.184.0/24	==+==10.161.149.0/24
222	  |1			  |1
223	host			host
224
225	DF bit$B$N@)8f$r3NG'$7$h$&$H;W$C$?$,$$$^$$$A3NG'$G$-$:!#(B
226	$B;v<B(B1: freeswan router$B$O!"<+J,$N(Bipsec tunnel$B$N(Bmtu$B$r(B1404$B$@$H;W$C$F$k(B
227		-> $B$3$N$;$$$+!"$A$g$C$H(Bfragment$B$7$9$.$N%1$"$j(B
228	$B;v<B(B2: freeswan host$B$O!"(Bkame host$B08$N(BTCP mss$B$,(B1364$B$@$H;W$C$F$k(B
229	$B;v<B(B3: freeswan host$B$O!"(Bkame router$B$+$iAw$i$l$k(Bicmp need fragment$B$r(B
230		$B$I$3$+$KCy$a$F$$$k$,!"$I$3$KCy$a$F$k$N$d$i$5$C$Q$j$o$+$i$J$$(B
231	kame$B$N(BDF bit$B=hM}$N5sF0$rD4$Y$k$K$O!"=i2s$K$7$+=P$J$$(Bicmp need
232	fragment$B$r$D$+$^$($J$$$H$$$1$J$$$,!"$D$+$^$($i$l$J$+$C$?!#(B
233	$B$H$j$"$($:!"(Btelnet chargen$B$7$?$H$-$N(Blog$B$rN>B&$H$C$?$N$rE:IU!#(B
234
235--- on kame host
23603:40:30.840690 0:0:86:5:80:da 0:10:4b:a2:8b:aa 0800 74: 10.161.149.1.1167 > 10.161.184.1.19: S 1110010782:1110010782(0) win 8192 <mss 1460,nop,wscale 0,nop,nop,timestamp 39628 0> (DF) [tos 0x10] (ttl 64, id 259)
23703:40:30.843568 0:10:4b:a2:8b:aa 0:0:86:5:80:da 0800 60: 10.161.184.1.19 > 10.161.149.1.1167: S 3191535599:3191535599(0) ack 1110010783 win 32736 <mss 1364> (ttl 62, id 61263)
238								       ~~~~
23903:40:30.843925 0:0:86:5:80:da 0:10:4b:a2:8b:aa 0800 60: 10.161.149.1.1167 > 10.161.184.1.19: . ack 1 win 9548 (DF) [tos 0x10] (ttl 64, id 260)
24003:40:30.848227 0:10:4b:a2:8b:aa 0:0:86:5:80:da 0800 128: 10.161.184.1.19 > 10.161.149.1.1167: P 1:75(74) ack 1 win 32736 (DF) [tos 0x10] (ttl 62, id 61264)
24103:40:30.857492 0:10:4b:a2:8b:aa 0:0:86:5:80:da 0800 1418: 10.161.184.1.19 > 10.161.149.1.1167: P 75:1439(1364) ack 1 win 32736 (DF) [tos 0x10] (ttl 62, id 61265)
242
243--- on freeswan host
244tcpdump: listening on eth0
24512:18:47.780450 0:0:e8:2a:26:93 0:e0:98:0:16:c0 0800 74: 10.161.149.1.1184 > 10.161.184.1.19: S 1540282774:1540282774(0) win 8192 <mss 1460,nop,wscale 0,nop,nop,timestamp 44145 0> (DF) [tos 0x10]
24612:18:47.780450 0:e0:98:0:16:c0 0:0:e8:2a:26:93 0800 58: 10.161.184.1.19 > 10.161.149.1.1184: S 400137676:400137676(0) ack 1540282775 win 32736 <mss 1364>
24712:18:47.790450 0:0:e8:2a:26:93 0:e0:98:0:16:c0 0800 60: 10.161.149.1.1184 > 10.161.184.1.19: . ack 1 win 9548 (DF) [tos 0x10]
24812:18:47.790450 0:e0:98:0:16:c0 0:0:e8:2a:26:93 0800 128: 10.161.184.1.19 > 10.161.149.1.1184: P 1:75(74) ack 1 win 32736 (DF) [tos 0x10]
24912:18:47.790450 0:e0:98:0:16:c0 0:0:e8:2a:26:93 0800 1418: 10.161.184.1.19 > 10.161.149.1.1184: P 75:1439(1364) ack 1 win 32736 (DF) [tos 0x10]
25012:18:47.940450 0:0:e8:2a:26:93 0:e0:98:0:16:c0 0800 60: 10.161.149.1.1184 > 10.161.184.1.19: . ack 1439 win 9548 (DF) [tos 0x10]
25112:18:47.940450 0:e0:98:0:16:c0 0:0:e8:2a:26:93 0800 1418: 10.161.184.1.19 > 10.161.149.1.1184: P 1439:2803(1364) ack 1 win 32736 [tos 0x10]
25212:18:47.940450 0:e0:98:0:16:c0 0:0:e8:2a:26:93 0800 1418: 10.161.184.1.19 > 10.161.149.1.1184: P 2803:4167(1364) ack 1 win 32736 [tos 0x10]
25312:18:47.940450 0:e0:98:0:16:c0 0:0:e8:2a:26:93 0800 1418: 10.161.184.1.19 > 10.161.149.1.1184: P 4167:5531(1364) ack 1 win 32736 [tos 0x10]
254
255
256	AH tunnel(hmac-MD5) freeswan router <-> kame router$B4V(B
257		host-host$B$N(Bping -f$B$b$A$c$s$HF0$/!#(B
258
259	AH tunnel(hmac-SHA1)
260		$B$@$a$@$a!#(Bfreeswan$B$N%P%0!"$^$?$O80@_Dj<:GT!#(B
261
262	ESP tunnel(DES+hmac-MD5):
263		kame router$B$N%P%0(B(snap-users$B;2>H(B)$B$N$;$$$G:G=iF0$+$J$+$C$?$,!"(B
264		$BD>$7$?!#$P$C$A$jF0$$$?!#(B
265		ping -f$B$N(Bpacket loss$BN((B25%
266			freeswan router$B$,$?$C$W$j(Blog$B$r$H$C$F$k$;$$(B?
267
268	AH transport(hmac-MD5) freeswan router <-> kame router$B4V(B
269		$B;n$7$?!#F0$$$?!#(B
270
271	freeswan$B$G$O!"APJ}8~$N80$O$*$J$8$H2>Dj$7$F$$$k(B($B$$$?(B)$B$i$7$$!#(B
272	$B:G6aD>$7$?$i$7$$$N$G!"=y!9$K$G$-$k$h$&$K$J$C$F$$$kLOMM!#(B
273
274